Skip to content

Commit e942da8

Browse files
committed
Check access redesign
1 parent 4ac8855 commit e942da8

File tree

4 files changed

+67
-17
lines changed

4 files changed

+67
-17
lines changed

articles/role-based-access-control/check-access.md

Lines changed: 67 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -28,51 +28,101 @@ Follow these steps to open the Azure resource that you want to check access for.
2828

2929
1. Open the Azure resource you want to check access for, such as **Management groups**, **Subscriptions**, **Resource groups**, or a particular resource.
3030

31-
1. Click the specific resource in that scope.
31+
1. Select the specific resource in that scope.
3232

3333
The following shows an example resource group.
3434

35-
![Screenshot of resource group overview.](./media/shared/rg-overview.png)
35+
:::image type="content" source="./media/shared/rg-overview.png" alt-text="Screenshot of resource group overview." lightbox="./media/shared/rg-overview.png":::
3636

37-
## Step 2: Check access for a user
37+
## Step 2: Check your access
3838

39-
Follow these steps to check the access for a single user, group, service principal, or managed identity to the previously selected Azure resource.
39+
Follow these steps to check your access to the previously selected Azure resource.
40+
41+
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [Microsoft Entra Privileged Identity Management (PIM)](/entra/id-governance/privileged-identity-management/pim-configure) functionality is integrated so you should follow the steps on the **PIM** tab.
42+
43+
# [Default](#tab/default)
44+
45+
1. Select **Access control (IAM)**.
46+
47+
The following shows an example of the Access control (IAM) page for a resource group.
48+
49+
:::image type="content" source="./media/shared/rg-access-control.png" alt-text="Screenshot of resource group access control and Check access tab." lightbox="./media/shared/rg-access-control.png":::
50+
51+
1. On the **Check access** tab, select the **View my access** button.
4052

41-
1. Click **Access control (IAM)**.
53+
An assignments pane appears that lists your access at this scope and inherited to this scope. Assignments at child scopes aren't listed.
54+
55+
:::image type="content" source="./media/check-access/rg-check-access-assignments.png" alt-text="Screenshot of role and deny assignments pane." lightbox="./media/check-access/rg-check-access-assignments.png":::
56+
57+
# [PIM](#tab/pim)
58+
59+
1. Select **Access control (IAM)**.
60+
61+
1. On the **My access** tab, view your role assignments at this scope and inherited to this scope. Assignments at child scopes aren't listed.
4262

4363
The following shows an example of the Access control (IAM) page for a resource group.
4464

45-
![Screenshot of resource group access control and Check access tab.](./media/shared/rg-access-control.png)
65+
:::image type="content" source="./media/check-access/rg-access-control-pim.png" alt-text="Screenshot of resource group access control and Check access tab for PIM integration." lightbox="./media/check-access/rg-access-control-pim.png":::
4666

47-
1. On the **Check access** tab, click the **Check access** button.
67+
If you have Microsoft Entra Privileged Identity Management (PIM), you also see [eligible and time-bound role assignments](pim-integration.md).
4868

49-
1. In the **Check access** pane, click **User, group, or service principal**.
69+
---
70+
71+
## Step 3: Check access for a user
72+
73+
Follow these steps to check the access for a single user, group, service principal, or managed identity to the previously selected Azure resource.
74+
75+
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [Microsoft Entra Privileged Identity Management (PIM)](/entra/id-governance/privileged-identity-management/pim-configure) functionality is integrated so you should follow the steps on the **PIM** tab.
76+
77+
# [Default](#tab/default)
78+
79+
1. Select **Access control (IAM)**.
80+
81+
1. On the **Check access** tab, select the **Check access** button.
82+
83+
1. In the **Check access** pane, select **User, group, or service principal**.
5084

5185
1. In the search box, enter a string to search the directory for display names, email addresses, or object identifiers.
5286

53-
![Screenshot of Check access select list.](./media/shared/rg-check-access-select.png)
87+
:::image type="content" source="./media/shared/rg-check-access-select.png" alt-text="Screenshot of Check access select list." lightbox="./media/shared/rg-check-access-select.png":::
5488

55-
1. Click the user to open the **assignments** pane.
89+
1. Select the user to open the **assignments** pane.
5690

5791
On this pane, you can see the access for the selected user at this scope and inherited to this scope. Assignments at child scopes aren't listed. You see the following assignments:
5892

5993
- Role assignments added with Azure RBAC.
6094
- Deny assignments added using Azure Blueprints or Azure managed apps.
6195
- Classic Service Administrator or Co-Administrator assignments for classic deployments.
6296

63-
![Screenshot of role and deny assignments pane for a user.](./media/shared/rg-check-access-assignments-user.png)
97+
:::image type="content" source="./media/shared/rg-check-access-assignments-user.png" alt-text="Screenshot of role and deny assignments pane for a user." lightbox="./media/shared/rg-check-access-assignments-user.png":::
6498

65-
## Step 3: Check your access
99+
# [PIM](#tab/pim)
66100

67-
Follow these steps to check your access to the previously selected Azure resource.
101+
1. Select **Access control (IAM)**.
68102

69-
1. Click **Access control (IAM)**.
103+
1. On the **My access** tab, select the **Check access** button.
70104

71-
1. On the **Check access** tab, click the **View my access** button.
105+
A **Check access** pane appears.
72106

73-
An assignments pane appears that lists your access at this scope and inherited to this scope. Assignments at child scopes aren't listed.
107+
1. Select **User, group, or service principal**.
108+
109+
1. In the search box, enter a string to search the directory for name or email addresses.
110+
111+
:::image type="content" source="./media/shared/rg-check-access-select.png" alt-text="Screenshot of Check access select list." lightbox="./media/shared/rg-check-access-select.png":::
74112

75-
![Screenshot of role and deny assignments pane.](./media/check-access/rg-check-access-assignments.png)
113+
1. Select the user to open the **assignments** pane.
114+
115+
On this pane, you can see the access for the selected user at this scope and inherited to this scope. Assignments at child scopes aren't listed. You see the following assignments:
116+
117+
- Role assignments added with Azure RBAC.
118+
- Deny assignments managed by Azure.
119+
- Classic Service Administrator or Co-Administrator assignments for classic deployments.
120+
121+
If you have PIM, you also see a **Eligible assignments** tab with [eligible and time-bound role assignments](pim-integration.md).
122+
123+
:::image type="content" source="./media/check-access/rg-check-access-assignments-user-pim.png" alt-text="Screenshot of role and deny assignments pane for a user for PIM integration." lightbox="./media/check-access/rg-check-access-assignments-user-pim.png":::
124+
125+
---
76126

77127
## Next steps
78128

104 KB
Loading
44.3 KB
Loading
-6.01 KB
Loading

0 commit comments

Comments
 (0)